top 5 features of application visibilty and control
TRANSCRIPT
Application Visibility and Control
Top 5 Features & Benefits
Application Visibility and Control??
Application visibility and control offers total visibility and contol over, which application by which user is being accesed within the organization, irrespective of their ports and protocols.
It is the best way to avoid application-layer threats, including malware, phishing, botnets etc.
Cyberoam with layer 7 and layer 8 identity-based policies and reporting offers application visibility and control over 2000+ key applications.
Top 5 Features of Cyberoam's Application Visibility and Control
1) Application Security
2) Granular Controls
3) User and Time-based Controls for Application Access
4) Layer 8 Identity and QoS-based Application Control
5) QoS for Applications
*QoS= Quality of Service
1) Application Security
Features It restricts and blocks anonymous proxies
Prevents “phone home” activities and keyloggers
Layer 7 and Layer 8 visibility
Database available with inbuilt application category Benefits: Prevents sophisticated application-based threats including malware,
phishing, botnets
2) Granular Controls
Features: Pro-active protection model
Applications are categorized based on their level of risk, characteristics and technology
Benefits: Policies can be set or edited easily for application access with just few
clicks
No manual updates needed for new application in network
3) User and Time-based Controls for Application Access
Features: Controls usage of social applications and networking sites, such as:
Facebook, YouTube etc.
Controls P2P (peer-to-peer) applications, such as: Skype
Bifurcates creation of White (Business-critical), Grey (social, entertainment) and Black (non-productive) application categories based on priority
Schedules non-critical applications during non-peak hours.
3) User and Time-based Controls for
Application Access
Benefits: Controlled bandwidth usage
Enhanced productivity through flexibility
Supports business-critical applications
Ensures application security
4) Layer 8 Identity and QoS-based Application Control
Features: Controls usage of application depending upon user, user group,
bandwidth, sources and destination.
Benefits: Enhanced productivity
Optimizes usage of bandwidth
Supports user-critical applications, such as VoIP
5) QoS for Applications
Features: Limits bandwidth allocation to non-business applications
Priority-based bandwidth allocation to critical applications
Benefits: Optimized bandwidth utilization
Enables application QoS
*QoS= Quality of Service
Cyberoam Technologies
USA Central : +1-732-412-4896Delhi & NCR : +91-9899150300Ahmedabad : +91-9925011328Bangalore: +91-9880345671 Dubai: +971-4-214 9860
Cyberoam House,Saigulshan Complex,
Opp. Sanskruti,Beside White House,
Panchwati Cross Road,Ahmedabad - 380006,
GUJARAT, INDIA.
Cyberoam TechnologiesCyberoam TechnologiesCyberoam TechnologiesCyberoam TechnologiesCyberoam Technologies
North America505 Thornall
Street, Suite # 304Edison, NJ -08837
USA